Title: DoubleTake Software
1Double-TakeSolutions for High Availability and
Disaster Recovery Waleed Samy Senior Data
Protection Consultant wsamy_at_e-softcommerce.com M
ob. 2 0125092228
2Agenda for Today
- Who is Double-Take Software?
- The need for HA and DR
- What solutions do exist today?
- Introducing Double-Take
- Solutions overview and virtualization of DR sites
- Virtual Demo Double-Take for Exchange / SQL
Server - QA
3Who is Double-Take Software?
- Founded in 1991 in USA as NSI Software
- Based in Indianapolis and New Jersey
- Acquired Sunbelt System Software Europe in May
2006 (this does NOT include Sunbelt Software
Distribution in the USA) - Launched Double-Take in 1996
- Offices in US, France, UK, Sweden, Germany,
Belgium (Brugge), DUBAI - 120000 licenses in production today
4The Business Issues Why?
- Increased reliance on ICT
- Effective 24x7 opening hours (e-Commerce)
- Applications Data are now important
- e-Mail ERP are mission critical
- Big projects are finished So..
- What about High Availability?
- What about Disaster Recovery?
- Windows is increasingly present and strategic
within the company - 85 of the servers used by these customers are
Microsoft driven - Downtime is not an option
- Risk Assessment investors, reputation, lost of
sales, loosing customers
5Increased Compliance Pressures
- Small Companies
- Even small companies have compliance needs
- Companies act, Financial Services, Gaming etc
- Going concern audit assessments
- Enterprise
- Services obligations
- Government
- Industry
- Basel II for financial sector
- PharmaceuticalsWe have to maintain the
availability of our systems.While there is a
cost to doing so so there is a cost in not
doing so!
6Causes of non-availability
- Server crashes
- Hardware or software
- Theft of servers
- Fire, Flood Explosions
- Electricity Black-outs
- Terrorism
- Natural Disasters
- Human Errors
7Statistical Causes of System Failure
Source Consolidated Analyst Reports - IDC,
Gartner, Forrester
8Definition High Availability
- Goal make systems more available to clients
(reduce downtime) by providing higher user access
to services and applications - Design guidelines
- Some form of failover is required
- Same quality of service to clients after failover
- Note failover is transparent to users and
applications
9Definition Disaster Recovery
- Goal protect against site failure caused by
natural disasters, site loss, power outage by
keeping an off-site copy of mission critical data - Design guidelines
- Switched / controlled failover
- Different sites or locations (WAN links)
- Note Remote Availability HA over WAN
10Definition RTO and RPO
- RTO Recovery Time ObjectiveTime needed to
restore the data (seconds, hours, days) - RPO Recovery Point ObjectiveTo which point in
time do we restore the data (how much data loss?)
11Solutions we know today
- Backup long restore time (RTO), data is already
obsolete at moment of restore (RPO) - Microsoft Cluster hardware specific, , HA
solution only, cluster-aware applications,
Enterprise Editions only - SAN replication high bandwidth, specific
storage, - File copy tools (Robocopy, FRS) does not work
with production data (open files), scheduled, low
performance
12Double-Take / MSCS differences
13Introducing Double-Take
- Real-time Data ProtectionAllows real-time
byte-level open file replication of data changes
from a production to a backup machine - Automatic Server FailoverAllows a backup server
to stand in for a primary server in the event of
a failure - Advanced MonitoringFull support of all
monitoring standards (SNMP, SMTP) and integration
with MOM
14Double-Take Components
- DoubleTake for WindowsRuns on all Windows
Server platforms Server, Enterprise, Datacenter,
Storage Server Edition (NT 4.0 -gt Windows 2003
Windows 2008)Virtual Systems are also
supportedDouble-Take for Linux - Software-OnlyDouble-Take is host-based
replication, no requirement for specific hardware
15Replication Process
STAR Technology Sequential Transfer Asynchronous
Replication
Its the same data in the same order !
Data Consistency
Application
487
. . . . . . . . . .
Operating System
File System
File Operation 326 Path File
SOME.DOC Operation Write Start 1720
bytes Length 120 bytes Data Some
Data Checksum A923D0F2
328
D\SERV1\MyData
327
Hardware Layer
326
16Replication Process
Any IP Network(LAN / WAN)
File Operation 326 Path d\MSSQL\LOGS\ File
EMPLOYEES.LDF Operation Write Start 1720
bytes Length 12 bytes Data 512-555-1212 Chec
ksum A923D0F2
Hardware and Application independent
17Replication Process
Primary Double-Take Server
Backup Double-Take Server
TCP/IP Network
Step 1 Application writes data to file. It is
also captured by the Double-Take filter driver on
the primary server
18Replication Process
Primary Double-Take Server
Backup Double-Take Server
TCP/IP Network
Step 2 Double-Take transmits the data over the
TCP/IP network (LAN / WAN) to the backup server
19Replication Process
Primary Double-Take Server
Backup Double-Take Server
TCP/IP Network
Step 3 A copy of the data is written to the disk
on the backup server
20Connection Features
Primary Double-Take Server
Backup Double-Take Server
TCP/IP Network
STAR Technology with options for scheduling,
compression (3 levels on/off) and bandwidth
limiting / scheduling tune Double-Take for your
particular network requirements!
21Failover Process
- Client writes data to Server1 (source machine)
Client
- Source machine replicates to target machine in
real-time, target machine monitors source machine
Server2 10.0.0.12
Server1 10.0.0.11
- Target machine detects failure and takes on
server name and IP address of source machine
Server110.0.0.11
- Target machine runs failover scripts, restarting
Server 1 applications
22Failover Process Many To One
Production (source) Servers
FS1 DB
10.9.9.1
WWW Services started
10.9.9.2
FS2
DB Services started
Redundant (target) Server
FS3 WWW
10.9.9.3
FSDT
10.9.9.252
FS4
10.9.9.4
FS5 File
10.9.9.5
23Double-Take Solutions
Great, but what can we do with Double-Take?
24One to One
One machine is a dedicated backup for high
availability(Active Passive)
WAN
WAN
25One to One
Both machines may be providing high availability
for each other(Active Active)
WAN
WAN
26Disaster Recovery
Send data to an off-site location
WAN
WAN
27One to Many
Send data to multiple locations from a single
source. Provide data distribution
WAN
WAN
28Many to One
Centralize data from multiple source servers to
asingle target server
WAN
29Centralized Backup
Centralize data from multiple source servers to a
single target server for backup
WAN
30Local HA and Remote DR
Send data to an off-site location
WAN
WAN
31Double-Take Flexibility
The possibilities with Double-Take are
nearly limitless!
WAN
32Double-Take Solutions
- One-to-One
- One-to-Many
- Many-to-One
- Many-to-Many
- Centralized Backup
- Chained
- Same server (C\ to D\)
33Double-Take Solutions
Other Solutions
- Testing or migration
- Application and service pack testing
- Local disk migration
- Server hardware migration
- Scheduled maintenance coverage
- Disaster Recovery for MSCS
- Source and target server do not need identical
hardware - Full scripting with DTCL commands (version 5.0
VBScript)
34Double-Take Solutions
Supported Applications
- File and Print Servers
- SQLServer 7.0, 2000 and 2005
- Exchange Server 5.5/2000/2003/2007
- IIS and SharePoint Server
- Oracle, Sybase, DB2, Informix
- Virtual Systems
- And a lot more! DoubleTake is Application-Independ
ent.
35Double-Take and Virtual Systems
One to One HA
FS1
FS1
EXCHANGE
EXCHANGE
FS2
FS2
SQL
SQL
WWW
WWW
Virtual Machines
36Double-Take and Virtual Systems
One to One DR
FS1
FS1
SQL
SQL
WAN
EXCHANGE
EXCHANGE
FS2
FS2
WWW
WWW
Virtual Machines
Virtual Machines
- HA and DR solutions
- Full failover capabilities for all virtual
sessions - LAN WAN support for regional DR protection
- Lower TCO with minimized hardware requirements
37Double-Take and Virtual Systems
Many to One DR
FS1
WAN
SQL
EXCHANGE
FS2
WWW
Virtual Machines
38Double-Take Application Manager
Virtual Demo
39Double-Take Application Manager
DTAM "Virtual Demo"
- Evolution of application protection strategy
- Takes application protection to the next level
- Unified framework for application protection
configuration, monitoring and management - Simplifies and automates Double-Take protection
of business-critical applications
- One Solution Multiple Applications
- Application-Independent
- Available to customers at no additional charge
40Exchange Availability with DTAM
DTAM "Virtual Demo"
41Exchange Availability with DTAM
DTAM "Virtual Demo"
42DTAM Virtual Demo
DTAM "Virtual Demo"
- First, select the Active Directory Domain where
Exchange is installed. - Second, Select the Source Exchange server from
the drop-down list.
43DTAM Virtual Demo
DTAM "Virtual Demo"
- Next, Select the Target Exchange server from
the drop-down list.
44DTAM Virtual Demo
DTAM "Virtual Demo"
- Optionally, you can click the Configure
Protection button to configured advanced options.
45DTAM Virtual Demo
DTAM "Virtual Demo"
- The Configure button in the Failover Type
section allows you to configure advanced failover
options for DNS.
46DTAM Virtual Demo
DTAM "Virtual Demo"
- In the advanced failover options dialog, you can
configure which addresses to monitor and can
specify credentials that should be used for
updating DNS.
47DTAM Virtual Demo
DTAM "Virtual Demo"
- By default, all required Exchange services are
failed over to the secondary server. If
additional services are required to support
solutions like virus protection or mobile access,
they can be added by selecting them from a
drop-down list.
48DTAM Virtual Demo
DTAM "Virtual Demo"
- On the Connection tab, you can specify settings
such as replication route, mirror type and
compression. - You can also select which Exchange storage groups
should be protected by replication and failover.
49DTAM Virtual Demo
DTAM "Virtual Demo"
- The Advanced tab can be used to configure
specialized settings for your environment i.e.,
adding additional dataset to be replicated.
50DTAM Virtual Demo
DTAM "Virtual Demo"
- DTAM v4.1 includes a feature called
Configuration Cloning which will make any
necessary changes to the secondary Exchange
servers configuration
51DTAM Virtual Demo
DTAM "Virtual Demo"
- The Validate button will run a Pre-Flight
check before protection is enabled.
52DTAM Virtual Demo
DTAM "Virtual Demo"
- If there are problems with Exchange or
Double-Take, they will be listed. Click Fix
All to repair.
53DTAM Virtual Demo
DTAM "Virtual Demo"
- Once validation is complete, click Enable
Protection.
54DTAM Virtual Demo
DTAM "Virtual Demo"
- Mirroring of the protected Exchange data will be
started.
55DTAM Virtual Demo
DTAM "Virtual Demo"
- Once mirroring is complete, protection, Exchange
is protected.
56DTAM Virtual Demo
DTAM "Virtual Demo"
- Failover can be initiated manually by clicking
the Failover button.
57DTAM Virtual Demo
DTAM "Virtual Demo"
- The type of failover can be selected either
Immediate or Graceful.
58DTAM Virtual Demo
DTAM "Virtual Demo"
- Failover beginsthe current status is reported at
the bottom of the console.
59DTAM Virtual Demo
DTAM "Virtual Demo"
- When failover is complete, the Protection and
Failover and Monitoring status areas will be
updated.
60DTAM Virtual Demo
DTAM "Virtual Demo"
- ExchFailover.log provides details about
the failover process.
61DTAM Virtual Demo
DTAM "Virtual Demo"
- When the Source server is repaired, click
Failback. - Select Failback options and then click Initiate
Failback.
62DTAM Virtual Demo
DTAM "Virtual Demo"
- Once failback is complete, protection can
automatically be resumed or it can be configured
again using the setup tab of Exchange Manager.
63DTAM Virtual Demo support for SQL
DTAM "Virtual Demo"
- The Advanced tab can be used to configure
specialized settings - It also allows you to choose a protection mode
for SQL. The default setting of SQL Instance
will protect all user and system databases.
64DTAM Virtual Demo support for SQL
DTAM "Virtual Demo"
- If the protection mode is set to Database
Only, you can select which user databases are to
be protected. - In Database Only mode, the path to which the
user databases are replicated can also be changed.
65Double-Take Snapshot Feature Pack
Integration with VSS from Double-Take
66Disaster Recovery for MSCS
Adding DR to MSCS
67DR for MSCS
MSCS Nodes
Double-Take
Double-Take
Replication from Node 1
Double-Takefor DR
68DR for MSCS
MSCS Nodes
X
Double-Take
Double-Take
Replication from Node 2
Double-Takefor DR
69DR for MSCS
MSCS Nodes
X
X
X
Double-Take
Double-Take
Data available via Double-Takes Failover,
including virtual server name and IP address!
Double-Take Failover Network Name IP
Address File Share
Double-Take
70In het kader van hun Business Continuity Plan
hebben volgende bedrijven reeds voor Double Take
gekozen
- Internationale kamer van koophandel
- De Lijn
- Nationale loterij
- Estee Lauder
- ING Direct
- General Electric
- Nuon
- ABN AMRO
- Nestlé
- Buffalo Grill
- Laboratoiria Clarins
- SACEM
- France Telecom
- Creyfs Group
- Randstad
- Vrije universiteit Brussel
- Provinciebestuur Limburg
- Handicap International
- Banden de Condé
- Central Europe Bank (ECB)
- KPMG
- Powernext
- Banque Privée De Edmond Rothschield
- Europeese Commisie
- NATO
- Carrefour
- NEC
- Alcatel
- TELE 2
- Brinks
- Belgacom
- Pfizer
- Dassault Falcon Services
- 3 Suisses
- Danone
- Vandemoortele
- Johnson Johnson
- College of Europe
71Questions and Answers
- More info on Double-Take
- www.doubletake.com